Voting

From Issuepedia
Revision as of 01:29, 14 June 2007 by Woozle (talk | contribs) (→‎Video: tempest attack)
Jump to navigation Jump to search

Overview

This page is a seed article. You can help Issuepedia water it: make a request to expand a given page and/or donate to help give us more writing-hours!

Related Pages

Links

Reference

News

Video

  • 2007-06-09 changing the ROMs of a Nedap e-voting computer in 60 seconds: the ROMs control how the machine works; a thorough visual examination of the system wouldn't necessarily be able to detect the swap. Voting machines can be designed to prevent this, however, by including a nonvolatile memory area containing an encrypted hash of the authorized ROM contents. At boot time, before loading the ROMs, the machine would compare the hash of the actual ROMs with the stored hash; if they did not match, it would refuse to boot and would display an error message alerting operators to the problem. Any machine which does not have a solution like this built into it, though, is therefore vulnerable to this kind of swap.
  • 2006-10-11 voting computer tempest attack: The Nedap ES3B voting computer leaks a signal, receivable at up to 25m, which can be decoded to detect what votes are being cast. 90% of all Dutch votes are cast using that computer, according to the video.